-
在网络上销售的商业管理系统,一般都要注册才能使用。本实例将使用INT文件对软件进行用户信息注册。...
在网络上销售的商业管理系统,一般都要注册才能使用。本实例将使用INT文件对软件进行用户信息注册。-On the network marketing business management systems, generally have to register to use. INT files in this instance will use the software user information registration.
- 2022-07-13 07:21:15下载
- 积分:1
-
The Cryptography API: Next Generation (CNG) is a new and agile framework in Wind...
The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which implements an extensible provider model that allows you to load a provider by specifying the required cryptographic algorithm rather than having to hardcode a specific provider. -The Cryptography API: Next Generation (CNG) is a new and agile framework in Windows Vista, which implements an extensible provider model that allows you to load a provider by specifying the required cryptographic algorithm rather than having to hardcode a specific provider.
- 2022-04-29 00:05:09下载
- 积分:1
-
hash算法的vb实现.很好用!
hash算法的vb实现.很好用!-hash algorithm to achieve the vb. With good!
- 2022-03-21 07:41:04下载
- 积分:1
-
IDEA加密算法(PGP中使用的加密算法),对想研究pgp加密的人有没莫大帮助...
IDEA加密算法(PGP中使用的加密算法),对想研究pgp加密的人有没莫大帮助-IDEA encryption algorithm (PGP encryption algorithm used), and would like to study people pgp encryption has not much help to
- 2023-07-22 23:40:03下载
- 积分:1
-
DWT_shuiyin2
两三年前写的dwt水印加密解密,比较简单,再找找看好些的程序,供初学者看看把~(23 before writing dwt watermarking encryption and decryption, relatively simple, and the room and look better procedures, for beginners to see put ~)
- 2007-04-03 21:14:28下载
- 积分:1
-
DES
VC编写的简单DES加密程序,密钥由用户手动输入,可加密字符串(VC prepared by the simple DES encryption program, the key to manually input by the user)
- 2014-07-28 22:45:11下载
- 积分:1
-
x264编码一个可执行程序的x264.exe,因为我只修改X264算法…
一个x264编码的可执行程序 x264.exe,因为我只修改了 x264 的算法,未加入任何汇编,也没有修改x264的接口和功能,所以原版 x264 能运行的平台,此程序也应当能运行,且功能及调用方式不变。
执行命令方式为:
-o 输出文件 输入文件 宽x高 -B 目标码率-X264 encoding an executable program x264.exe, because I only modified x264 algorithms, not to join any compilation, there is no modification of the interface and functionality of x264, the x264 can run the original platform, this procedure should also be able to run, and function and calls the same way. For the implementation of the order:-o output file input file width x high-B target rate
- 2022-05-21 01:18:22下载
- 积分:1
-
Classical-cryptography
密码技术实验一经典密码学实验维多利亚密码加密解密(Password technological experiments classic cryptography experimental Victoria password encryption and decryption)
- 2012-09-03 21:18:45下载
- 积分:1
-
支付宝接口调用
这是一个jsp的的项目。用于支付宝接口开发的MD5加密算法,详细的内容在里面 。
- 2022-02-01 23:48:59下载
- 积分:1
-
128192和256位密钥的密码Twofish的VHDL实现。
VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.-VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some
- 2022-07-08 23:33:44下载
- 积分:1